Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    24-05-2024 02:51

General

  • Target

    6d1ad1cf2773853651a3042647d76397_JaffaCakes118.exe

  • Size

    184KB

  • MD5

    6d1ad1cf2773853651a3042647d76397

  • SHA1

    c9fac91a1abe63239aa5f2fdac1f7949ec81ef10

  • SHA256

    e28f61d45a3e4d5862cdc09faca5309efa2b13fb5161df826bf266bc72dc2b4c

  • SHA512

    df391603c334a50f733440c9f3554e9d34a30e2523b4f0151c6386e75147adda5d09dee324e16f28e1a624566ddb8e70e5118a4b556febd7eeb324ad30c19566

  • SSDEEP

    1536:/qZcWA7LVxwDtK/Rz0zCTWFW8yc+ltsvp9FtxBza5STdYPk/XCfG6Euo52tEtFCb:C3SJWhret+FtLzaUtyfGyvtuSZOg4+C

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Unexpected DNS network traffic destination 20 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6d1ad1cf2773853651a3042647d76397_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\6d1ad1cf2773853651a3042647d76397_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2880
    • C:\Users\Admin\AppData\Roaming\alFSVWJB\jevgr.exe
      C:\Users\Admin\AppData\Roaming\alFSVWJB\jevgr.exe
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2072
      • C:\Windows\SysWOW64\cmd.exe
        /a /c netsh advfirewall firewall add rule name="alFSVWJB" dir=in action=allow program="C:\Users\Admin\AppData\Roaming\alFSVWJB\jevgr.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2740
        • C:\Windows\SysWOW64\netsh.exe
          netsh advfirewall firewall add rule name="alFSVWJB" dir=in action=allow program="C:\Users\Admin\AppData\Roaming\alFSVWJB\jevgr.exe"
          4⤵
          • Modifies Windows Firewall
          PID:2640
      • C:\Users\Admin\AppData\Roaming\alFSVWJB\jevgr.exe
        "C:\Users\Admin\AppData\Roaming\alFSVWJB\jevgr.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:1736
    • C:\Windows\SysWOW64\cmd.exe
      /a /c ping 127.0.0.1 -n 3&del "C:\Users\Admin\AppData\Local\Temp\6D1AD1~1.EXE"
      2⤵
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:1292
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1 -n 3
        3⤵
        • Runs ping.exe
        PID:2720

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Roaming\alFSVWJB\jevgr.exe

    Filesize

    184KB

    MD5

    6d1ad1cf2773853651a3042647d76397

    SHA1

    c9fac91a1abe63239aa5f2fdac1f7949ec81ef10

    SHA256

    e28f61d45a3e4d5862cdc09faca5309efa2b13fb5161df826bf266bc72dc2b4c

    SHA512

    df391603c334a50f733440c9f3554e9d34a30e2523b4f0151c6386e75147adda5d09dee324e16f28e1a624566ddb8e70e5118a4b556febd7eeb324ad30c19566

  • memory/1736-27-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1736-18-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1736-28-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1736-14-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1736-12-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1736-16-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1736-20-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1736-24-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1736-22-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2072-43-0x0000000000400000-0x000000000043D000-memory.dmp

    Filesize

    244KB

  • memory/2072-8-0x0000000000400000-0x000000000043D000-memory.dmp

    Filesize

    244KB

  • memory/2072-31-0x0000000000400000-0x000000000043D000-memory.dmp

    Filesize

    244KB

  • memory/2072-29-0x0000000000400000-0x000000000043D000-memory.dmp

    Filesize

    244KB

  • memory/2072-55-0x0000000000400000-0x000000000043D000-memory.dmp

    Filesize

    244KB

  • memory/2072-53-0x0000000000400000-0x000000000043D000-memory.dmp

    Filesize

    244KB

  • memory/2072-51-0x0000000000400000-0x000000000043D000-memory.dmp

    Filesize

    244KB

  • memory/2072-47-0x0000000000400000-0x000000000043D000-memory.dmp

    Filesize

    244KB

  • memory/2072-33-0x0000000000400000-0x000000000043D000-memory.dmp

    Filesize

    244KB

  • memory/2072-35-0x0000000000400000-0x000000000043D000-memory.dmp

    Filesize

    244KB

  • memory/2072-37-0x0000000000400000-0x000000000043D000-memory.dmp

    Filesize

    244KB

  • memory/2072-39-0x0000000000400000-0x000000000043D000-memory.dmp

    Filesize

    244KB

  • memory/2072-41-0x0000000000400000-0x000000000043D000-memory.dmp

    Filesize

    244KB

  • memory/2072-49-0x0000000000400000-0x000000000043D000-memory.dmp

    Filesize

    244KB

  • memory/2072-45-0x0000000000400000-0x000000000043D000-memory.dmp

    Filesize

    244KB

  • memory/2880-2-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/2880-1-0x0000000000260000-0x0000000000261000-memory.dmp

    Filesize

    4KB

  • memory/2880-10-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/2880-9-0x0000000000400000-0x000000000043D000-memory.dmp

    Filesize

    244KB

  • memory/2880-0-0x0000000000240000-0x0000000000256000-memory.dmp

    Filesize

    88KB